Mobile Device Security: Cloud and Hybrid Builds

Download the Practice Guide

The NCCoE has released the draft version of NIST Cybersecurity Practice Guide SP 1800-4, Mobile Device Security: Cloud and Hybrid Builds. Use the buttons below to view this publication in its entirety or scroll down for links to a specific section.

Download PDF »Open Web Version »

Current Status

The NIST Cybersecurity Practice Guide is available as a draft. For ease of use, the draft guide is available to download or read in volumes:

  • SP 1800-4a: Executive Summary (PDF) (web page)
  • SP 1800-4b: Approach, Architecture, and Security Characteristics (PDF) (web page)
  • SP 1800-4c: How-To Guides (PDF) (web page)

Or you can download all volumes in a zip file, including supplemental files (10.5 MB).

Read our two-page fact sheet for an overview this project. For archival purposes, you may download the revised and original Project Descriptions.

Sign up for email alerts from the NCCoE to receive updates on our Mobile Device Security projects. If you have questions or would like to join our Community of Interest, please email the project team at mobile-nccoe@nist.gov.

Summary

The NIST Cybersecurity Practice Guide “Mobile Device Security: Cloud & Hybrid Builds” demonstrates how commercially available technologies can meet your organization’s needs to secure sensitive enterprise data accessed by and/or stored on employees’ mobile devices.

In our lab at the NCCoE, part of the National Institute of Standards and Technology (NIST), we built an environment based on typical mobile devices and an enterprise email, calendaring, and contact management solution. Additionally, we demonstrated how security can be supported throughout the mobile device lifecycle, including:

  • configure a device to be trusted by the organization
  • maintain adequate separation between the organization’s data and the employee’s personal data stored on or accessed from the mobile device
  • handle the de-provisioning of a mobile device that should no longer have enterprise access (e.g., device lost or stolen, employee leaves the company.

Collaborating Vendors

Intel logo
Lookout logo
Microsoft logo
Symantec logo

The NCCoE implemented this project with technology vendor collaborators and/or its National Cybersecurity Excellence Partnership (NCEP) partners. They contributed hardware, software, and expertise on this project.

 

Disclaimer: Certain commercial entities, equipment, products, or materials may be identified in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST or NCCoE, nor is it intended to imply that the entities, equipment, products, or materials are necessarily the best available for the purpose.